Sciweavers

4438 search results - page 708 / 888
» The Case for Collaborative Programming
Sort
View
EDBTW
2010
Springer
15 years 12 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
HICSS
2009
IEEE
112views Biometrics» more  HICSS 2009»
15 years 12 months ago
Optimal Pumping Schedule and Salinity Control in a Coastal Aquifer: a Decision Support System
Proper management of coastal wells is important in order to satisfy demand, minimize costs, control salinity increase, and ultimately to define water resource strategies which are...
T. Ka'eo Duarte, Riccardo Minciardi, Michela Robba...
ICDS
2009
IEEE
15 years 12 months ago
An Iterative Method to Design Traffic Flow Models
Existing traffic flow modeling theory lacks of guidelines to construct traffic flow models from scratch. In addition, traffic flow models are mainly analyzed with computer simulat...
Juan Manuel González-Calleros, Jorge Mart&i...
CP
2009
Springer
15 years 12 months ago
Why Cumulative Decomposition Is Not as Bad as It Sounds
Abstract. The global cumulative constraint was proposed for modelling cumulative resources in scheduling problems for finite domain (FD) propagation. Since that time a great deal ...
Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, M...
DSN
2009
IEEE
15 years 12 months ago
MAP-AMVA: Approximate mean value analysis of bursty systems
MAP queueing networks are recently proposed models for performance assessment of enterprise systems, such as multi-tier applications, where workloads are significantly affected b...
Giuliano Casale, Evgenia Smirni